First published: Thu Oct 22 2015(Updated: )
A path traversal vulnerability was found in Busybox implementation of tar. tar will extract a symlink that points outside of the current working directory and then follow that symlink when extracting other files. This allows for a directory traversal attack when extracting untrusted tarballs. Reproducer: <a href="http://git.busybox.net/busybox/commit/?id=a116552869db5e7793ae10968eb3c962c69b3d8c">http://git.busybox.net/busybox/commit/?id=a116552869db5e7793ae10968eb3c962c69b3d8c</a> CVE assignment: <a href="http://seclists.org/oss-sec/2015/q4/121">http://seclists.org/oss-sec/2015/q4/121</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Busybox Busybox | <=1.21.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =14.04 | |
debian/busybox | 1:1.30.1-6 1:1.35.0-4 1:1.37.0-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2011-5325.
The severity of CVE-2011-5325 is high with a CVSS score of 7.5.
CVE-2011-5325 is a directory traversal vulnerability in the BusyBox implementation of tar before version 1.22.0 v5. It allows remote attackers to point to files outside the current working directory via a symlink.
The following software versions are affected by CVE-2011-5325: BusyBox before 1.22.0 v5, Debian Linux 8.0 and 9.0, and Canonical Ubuntu Linux 16.04, 18.04, 18.10, and 14.04.
To fix CVE-2011-5325, update BusyBox to version 1.22.0 v5 or later. For Debian Linux and Canonical Ubuntu Linux, update to the recommended versions specified in the remedy section of the affected software.